Correct Answer
verified
Multiple Choice
A) the geographical area covered by the network
B) the transmission technology used
C) the type of workstation used
D) the size of the company
Correct Answer
verified
Multiple Choice
A) is the basic protocol that permits communication between Internet sites.
B) controls Web browsers that access the WWW.
C) is the file format used to produce Web pages.
D) is a low-level encryption scheme used to secure transmissions in HTTP format.
Correct Answer
verified
Multiple Choice
A) defines the path to a facility or file on the web.
B) is the unique address that every computer node and host attached to the Internet must have.
C) is represented by a 64-bit data packet.
D) is the address of the protocol rules and standards that governing the design of internet hardware and software.
E) none of the above is true.
Correct Answer
verified
Multiple Choice
A) bridges and gateways connect one workstation with another workstation
B) the network interface card permits different networks to share data
C) file servers permit software and data to be shared with other network users
D) a universal topology facilitates the transfer of data among networks
Correct Answer
verified
Multiple Choice
A) star topology
B) bus topology
C) ring topology
D) client/server topology
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) is a password-controlled network for private users rather than the general public.
B) is a private network within a public network.
C) is an Internet facility that links user sites locally and around the world.
D) defines the path to a facility or file on the web.
E) none of the above is true.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Essay
Correct Answer
verified
View Answer
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) URL masquerading
B) digital signature forging
C) Internet protocol spoofing
D) a smurf attack
E) none of the above is true
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) the network consists of a central computer which manages all communications between nodes
B) has a host computer connected to several levels of subordinate computers
C) all nodes are of equal status; responsibility for managing communications is distributed among the nodes
D) information processing units rarely communicate with each other
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) LAN
B) decentralized network
C) multidrop network
D) Intranet
Correct Answer
verified
Multiple Choice
A) combines the messages of multiple users into a "spoofing packet" where the IP addresses are interchanged and the messages are then distributes randomly among the targeted users.
B) is a form of masquerading to gain unauthorized access to a web server.
C) is used to establish temporary connections between network devices with different IP addresses for the duration of a communication session.
D) is a temporary phenomenon that disrupts transaction processing.It will resolve itself when the primary computer completes processing its transaction and releases the IP address needed by other users.
Correct Answer
verified
Multiple Choice
A) Computing-as-a-Service
B) Infrastructure-as-a-Service
C) Platform-as-a-Service
D) Software-as-a-Service
Correct Answer
verified
Showing 1 - 20 of 111
Related Exams